When most people think of zero trust, they think of network security. All users and devices attempting to access the network are considered threats until their identity is verified and access rights validated. Access rights are strictly limited to what users need to do their jobs.
However, networks are not the only vulnerable elements of the IT environment. In fact, applications are typically the initial targets of attackers. Users normally access applications after they are authenticated, but authentication alone does not provide adequate protection against threats. Applications are still vulnerable to SQL injection, cross-site scripting and other attacks, as well as the lateral movement of hackers who have gained access to the network.
That’s why it’s critical for organizations to protect their applications as part of their zero trust strategy. Problems arise when organizations do this with a monolithic firewall.